Perl UTF-8 Regex Processing Bug Lets Users Deny Service
|
SecurityTracker Alert ID: 1023077 |
SecurityTracker URL: https://securitytracker.com/id/1023077
|
CVE Reference:
CVE-2009-3626
(Links to External Site)
|
Updated: Oct 31 2009
|
Original Entry Date: Oct 26 2009
|
Impact:
Denial of service via local system, Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes
|
Version(s): 5.10.1
|
Description:
A vulnerability was reported in Perl. A remote or local user can cause denial of service conditions.
A user can create a specially crafted UTF-8 code that, when processed by the regular expression parser, will cause the parser to crash.
Mark Martinec reported this vulnerability.
|
Impact:
A remote or local user can cause denial of service conditions. The specific impact depends on the application that uses perl.
|
Solution:
The vendor has issued a source code fix, available via GIT at:
http://perl5.git.perl.org/perl.git/commitdiff/0abd0d78a73da1c4d13b1c700526b7e5d03b32d4
|
Vendor URL: cpan.org/ (Links to External Site)
|
Cause:
State error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|